In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the product uses hard-coded credentials, which may allow an attacker to connect to a specific port.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-19378 In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the product uses hard-coded credentials, which may allow an attacker to connect to a specific port.
Fixes

Solution

No solution given by the vendor.


Workaround

Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.

History

Thu, 17 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-10-17T16:01:00.443Z

Reserved: 2024-01-05T21:39:05.426Z

Link: CVE-2024-21764

cve-icon Vulnrichment

Updated: 2024-08-01T22:27:36.321Z

cve-icon NVD

Status : Modified

Published: 2024-02-02T00:15:54.767

Modified: 2024-11-21T08:54:57.880

Link: CVE-2024-21764

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.